1
keystone (2012.2.4-0ubuntu1) UNRELEASED; urgency=low
3
* Dropped patches, applied upstream:
4
- debian/patches/CVE-2013-1865.patch: [255b1d4]
5
- debian/patches/CVE-2013-0282.patch: [f0b4d30]
6
- debian/patches/CVE-2013-1664+1665.patch: [8a22745]
7
* Resynchronize with stable/folsom (09f28020):
8
- [5ea4fcf] V2 API reported at Beta LP: 1135230
9
- [1889299] PKI-signed token hash saved as token ID for SQL backend only
11
- [40660f0] Key PKI tokens on hash in memcached for auth_token middleware
13
- [b3ce6a7] Use the right subprocess based on os monkeypatch
14
- [bb1ded0] keystone-all --config-dir is being ignored LP: 1101129
15
- [9e0a97d] Temporary network outage results in connection refused and
16
invalid token LP: 1150299
17
- [255b1d4] Validation of PKI tokens bypasses revocation check LP: 1129713
18
- [8690166] PKI tokens are broken after 24 hours LP: 1074172
19
- [790c87e] PKI tokens are broken after 24 hours LP: 1074172
20
- [f0b4d30] EC2 authentication does not ensure user or tenant is enabled
22
- [8a22745] DoS through XML entity expansion (CVE-2013-1664) LP: 1100282
24
-- Adam Gandelman <adamg@ubuntu.com> Thu, 25 Apr 2013 17:51:09 -0400
1
26
keystone (2012.2.3+stable-20130206-82c87e56-0ubuntu2) quantal-proposed; urgency=low
3
28
* Resync with latest security updates.